Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:32
Static task
static1
Behavioral task
behavioral1
Sample
1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe
Resource
win10v2004-20230220-en
General
-
Target
1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe
-
Size
683KB
-
MD5
8fe95d9cbb47bedce5f3771076000eaa
-
SHA1
0ed1941511f7cddd5b4878e288de11438d69e9fb
-
SHA256
1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e
-
SHA512
a60fbf4b97cb4b33a303fe070ce2a77c922875201fae8287c3d27e5ebc8ba2b1337f0d3d8ccf6458994bb757ebb644e550a3da438357073d95e9f0c7699cb850
-
SSDEEP
12288:JMrEy90s/mvCpjjcdmZ0+NgfFS+cKrWB4eWaujFA96:5yd/jpjjcQZM9XWyxha6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro1040.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1040.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-194-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-199-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-201-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-203-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-205-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-207-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-209-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-211-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-213-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-215-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-217-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-219-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-221-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-223-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-225-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/2204-227-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un865845.exepro1040.exequ5397.exesi127246.exepid process 4916 un865845.exe 2512 pro1040.exe 2204 qu5397.exe 4088 si127246.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1040.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1040.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1040.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un865845.exe1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un865845.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un865845.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3400 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1980 2512 WerFault.exe pro1040.exe 4112 2204 WerFault.exe qu5397.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1040.exequ5397.exesi127246.exepid process 2512 pro1040.exe 2512 pro1040.exe 2204 qu5397.exe 2204 qu5397.exe 4088 si127246.exe 4088 si127246.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1040.exequ5397.exesi127246.exedescription pid process Token: SeDebugPrivilege 2512 pro1040.exe Token: SeDebugPrivilege 2204 qu5397.exe Token: SeDebugPrivilege 4088 si127246.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exeun865845.exedescription pid process target process PID 5060 wrote to memory of 4916 5060 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe un865845.exe PID 5060 wrote to memory of 4916 5060 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe un865845.exe PID 5060 wrote to memory of 4916 5060 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe un865845.exe PID 4916 wrote to memory of 2512 4916 un865845.exe pro1040.exe PID 4916 wrote to memory of 2512 4916 un865845.exe pro1040.exe PID 4916 wrote to memory of 2512 4916 un865845.exe pro1040.exe PID 4916 wrote to memory of 2204 4916 un865845.exe qu5397.exe PID 4916 wrote to memory of 2204 4916 un865845.exe qu5397.exe PID 4916 wrote to memory of 2204 4916 un865845.exe qu5397.exe PID 5060 wrote to memory of 4088 5060 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe si127246.exe PID 5060 wrote to memory of 4088 5060 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe si127246.exe PID 5060 wrote to memory of 4088 5060 1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe si127246.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe"C:\Users\Admin\AppData\Local\Temp\1c23c6c70c4ed1c80de82a416c773c25ce589097f68d5dd7dcd2ceff652a879e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un865845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un865845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1040.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1040.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 11044⤵
- Program crash
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5397.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 18444⤵
- Program crash
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127246.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127246.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2512 -ip 25121⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2204 -ip 22041⤵PID:936
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5773e670b25e2157b7eb33f92cf134537
SHA1837606b2f5b9ba058e239ddd9e6fa83adf53ef7c
SHA256d469aaa659bf4594a09f8907a24494fab74ee248ca5986115b403ecc8f79625c
SHA5123c73df0e80e96262dd87ed100b6611b93115faec620a90a49fabb3bdf07c1ee89598130f810d26795f5323494567e06c640359e3e7a55d7f0a99f78aace0e456
-
Filesize
175KB
MD5773e670b25e2157b7eb33f92cf134537
SHA1837606b2f5b9ba058e239ddd9e6fa83adf53ef7c
SHA256d469aaa659bf4594a09f8907a24494fab74ee248ca5986115b403ecc8f79625c
SHA5123c73df0e80e96262dd87ed100b6611b93115faec620a90a49fabb3bdf07c1ee89598130f810d26795f5323494567e06c640359e3e7a55d7f0a99f78aace0e456
-
Filesize
541KB
MD5e817099fdfa69a276c946dd7db0e1d7b
SHA131aa7a31a3bed54832dfe7883b18f699cfe0a745
SHA2564992adf128f87c44edb3b6ee648e336d819bc248a2c58e0ccebc92e426e62b41
SHA512cca96870125656c1183c3a886c731faa04e9dc8e6672b71954df4811ca4dfbc97af7de7b6027aba9329c0f4d945867e4d8949641d1221e83b7c5c1c5d4ca7ff5
-
Filesize
541KB
MD5e817099fdfa69a276c946dd7db0e1d7b
SHA131aa7a31a3bed54832dfe7883b18f699cfe0a745
SHA2564992adf128f87c44edb3b6ee648e336d819bc248a2c58e0ccebc92e426e62b41
SHA512cca96870125656c1183c3a886c731faa04e9dc8e6672b71954df4811ca4dfbc97af7de7b6027aba9329c0f4d945867e4d8949641d1221e83b7c5c1c5d4ca7ff5
-
Filesize
322KB
MD558d7921cb913f03163f165bc060603db
SHA1f8300488bf055b62eb9373443b60d88a547400e7
SHA256c1551f1a0c173351d196b84a3ded7d7ef8b7a20f2d2e7221a2d418cd5e448f72
SHA512c36b016b24b5cd57d428e8adf6b09678e4b4b823278a445b750fcf11daea4a6aa10a0caf4c8a1263654717abc8990b3720e72bf0e56085f04a5abbe458666535
-
Filesize
322KB
MD558d7921cb913f03163f165bc060603db
SHA1f8300488bf055b62eb9373443b60d88a547400e7
SHA256c1551f1a0c173351d196b84a3ded7d7ef8b7a20f2d2e7221a2d418cd5e448f72
SHA512c36b016b24b5cd57d428e8adf6b09678e4b4b823278a445b750fcf11daea4a6aa10a0caf4c8a1263654717abc8990b3720e72bf0e56085f04a5abbe458666535
-
Filesize
379KB
MD5f459fa59de3e9f4b6638b498be41ead3
SHA1d3bb157b07a9b456c9ae89cd02a9fc940066f9e1
SHA256666deacf99394e4b13e2d0a0b599a92d65dbb5d8a07d2c3731782823eacd2c8d
SHA512dca8a1c7392f512972f3ed56d57711234c931e87af49d67291042ea035f55d63380943aebde1ec1286fbf6d66c2f5b7c84513d73a1bf087980ac6d52f0a9b1a3
-
Filesize
379KB
MD5f459fa59de3e9f4b6638b498be41ead3
SHA1d3bb157b07a9b456c9ae89cd02a9fc940066f9e1
SHA256666deacf99394e4b13e2d0a0b599a92d65dbb5d8a07d2c3731782823eacd2c8d
SHA512dca8a1c7392f512972f3ed56d57711234c931e87af49d67291042ea035f55d63380943aebde1ec1286fbf6d66c2f5b7c84513d73a1bf087980ac6d52f0a9b1a3